fixed spelling - updatd
This commit is contained in:
parent
eef4bd99c6
commit
188cca4495
@ -8,7 +8,7 @@
|
|||||||
<meta name="author" content="">
|
<meta name="author" content="">
|
||||||
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
|
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
|
||||||
|
|
||||||
<title>Why Anonymity isn’t enough for Sensitive use ?</title>
|
<title>Why isn't Anonymity enough for Sensitive use ?</title>
|
||||||
|
|
||||||
<!-- Bootstrap core CSS -->
|
<!-- Bootstrap core CSS -->
|
||||||
<link href="../../assets/css/bootstrap.css" rel="stylesheet">
|
<link href="../../assets/css/bootstrap.css" rel="stylesheet">
|
||||||
@ -71,11 +71,12 @@
|
|||||||
<p>Let’s say that Bob is using a popular online forum to leak information about a government agency’s unethical behavior. To stay anonymous, he makes sure to connect to the forum using Tor at the very minimum. He uses a burner email address to sign up to the forum and upload the sensitive files. His Anonymity during this sensitive action remains intact.</p>
|
<p>Let’s say that Bob is using a popular online forum to leak information about a government agency’s unethical behavior. To stay anonymous, he makes sure to connect to the forum using Tor at the very minimum. He uses a burner email address to sign up to the forum and upload the sensitive files. His Anonymity during this sensitive action remains intact.</p>
|
||||||
<img src="1.png" class="imgRz">
|
<img src="1.png" class="imgRz">
|
||||||
<p>However, there are only 10 people who could have originally had access to the leaked information, and Bob is one of those 10 potential suspects. </p>
|
<p>However, there are only 10 people who could have originally had access to the leaked information, and Bob is one of those 10 potential suspects. </p>
|
||||||
<p>The adversary makes use of the key disclosure legislation to issue search warrants to all 10 people, and to get to know the contents of their personal drives. Essentially, they don’t have anything solid against Bob, as the anonymity of the perpetrating party is intact, <b>but they are doing some guess work to try and find something incriminating anyway.</b> </p>
|
<p>The adversary makes use of key disclosure legislation to issue search warrants to all 10 people, and to get to know the contents of their personal drives. Essentially, the adversary doesn’t have anything solid against any of them, since the perpetrator’s anonymity is intact, <b>but some guess work is being done to try and find something incriminating anyway.</b> </p>
|
||||||
|
|
||||||
<img src="6.png" class="imgRz">
|
<img src="6.png" class="imgRz">
|
||||||
<p>Here’s the problem: the adversary busts down Bob’s door and <b>forces him to unlock his laptop, including every encrypted volume.</b> What happens then?</p>
|
<p>Here’s the problem: the adversary can just bust down Bob’s door and <b>force him to unlock his laptop, including every encrypted volume.</b> What happens then?</p>
|
||||||
<img src="../encryption/4.png" class="imgRz">
|
<img src="../encryption/4.png" class="imgRz">
|
||||||
<p><img src="../de2.png"> <b>Since Bob has no other choice but to comply when the adversary forces him to unlock his hard drives, and since e didn’t implement Deniable Encryption</b>, he has to show all the incriminating evidence, and therefore he can no longer deny implications with the sensitive activity.</p>
|
<p><img src="../de2.png"> <b>Since Bob has no other choice but to comply when the adversary forces him to unlock his hard drives, and since he didn’t implement Deniable Encryption</b>, he has to show all the incriminating evidence, and therefore he can no longer deny implications with the sensitive activity.</p>
|
||||||
<img src="5.png" class="imgRz">
|
<img src="5.png" class="imgRz">
|
||||||
<p> Bob’s setup, although suitable for Anonymous Use, is not suitable for Sensitive Use <b>due to the lack of Deniable Encryption</b></p>
|
<p> Bob’s setup, although suitable for Anonymous Use, is not suitable for Sensitive Use <b>due to the lack of Deniable Encryption</b></p>
|
||||||
<p><img src="../de0.png">For instance, if Bob had implemented <a href="../veracrypt/index.html">VeraCrypt’s deniable encryption</a> to store the sensitive data, <b>he could’ve given password A to open the decoy volume for the adversary, and could’ve claimed that there was no hidden volume. The adversary wouldn have no way to prove otherwise.</b></p>
|
<p><img src="../de0.png">For instance, if Bob had implemented <a href="../veracrypt/index.html">VeraCrypt’s deniable encryption</a> to store the sensitive data, <b>he could’ve given password A to open the decoy volume for the adversary, and could’ve claimed that there was no hidden volume. The adversary wouldn have no way to prove otherwise.</b></p>
|
||||||
|
@ -8,7 +8,7 @@
|
|||||||
<meta name="author" content="">
|
<meta name="author" content="">
|
||||||
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
|
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
|
||||||
|
|
||||||
<title>Why Privacy isn’t enough for Sensitive use ?</title>
|
<title>Why Isn't Privacy enough for Sensitive use ?</title>
|
||||||
|
|
||||||
<!-- Bootstrap core CSS -->
|
<!-- Bootstrap core CSS -->
|
||||||
<link href="../../assets/css/bootstrap.css" rel="stylesheet">
|
<link href="../../assets/css/bootstrap.css" rel="stylesheet">
|
||||||
|
@ -62,7 +62,7 @@
|
|||||||
<div class="col-lg-8 col-lg-offset-2">
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-08-19</ba></p>
|
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-08-19</ba></p>
|
||||||
<h1>How to write good Tutorials </h1>
|
<h1>How to write good Tutorials </h1>
|
||||||
<p>Because after all, how can you expect people to write good tutorials without being shown how to write them in the first place ? </p>
|
<p>Because after all, how can you expect people to write good tutorials without showing them how to write tutorials in the first place ? </p>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
</div><!-- /row -->
|
</div><!-- /row -->
|
||||||
@ -77,7 +77,7 @@
|
|||||||
<h2><b>Why? </b></h2>
|
<h2><b>Why? </b></h2>
|
||||||
<p><u>Context:</u> Suppose you are discovering OPSEC, Technology and all their abstract concepts, you are amazed at what you are finding, and you are now feeling very enthusiastic about sharing it to other people, but you don't know how to do it.</p>
|
<p><u>Context:</u> Suppose you are discovering OPSEC, Technology and all their abstract concepts, you are amazed at what you are finding, and you are now feeling very enthusiastic about sharing it to other people, but you don't know how to do it.</p>
|
||||||
<p><u>Situation:</u> You go into that <a href="https://matrix.to/#/#nowheremoe:nowhere.moe">matrix chatroom</a> you find that random dude called <a href="https://matrix.to/#/@nihilist:nowhere.moe">nihilist</a> and you start to explain into great detail how you managed to implement QubesOS with that whonix Xen VM, and that he should also force a VPN through the SOCKS Tor proxy and you proclaim that this is the ultimate setup, and everyone should implement it. <b>But before you can finish your ramblings the guy already ran away scared, he thought you were threatening him and his family.</b></p>
|
<p><u>Situation:</u> You go into that <a href="https://matrix.to/#/#nowheremoe:nowhere.moe">matrix chatroom</a> you find that random dude called <a href="https://matrix.to/#/@nihilist:nowhere.moe">nihilist</a> and you start to explain into great detail how you managed to implement QubesOS with that whonix Xen VM, and that he should also force a VPN through the SOCKS Tor proxy and you proclaim that this is the ultimate setup, and everyone should implement it. <b>But before you can finish your ramblings the guy already ran away scared, he thought you were threatening him and his family.</b></p>
|
||||||
<p> Are you OK with how badly you just communicated ? Are you fine with being throwing your message out there and Noone is even properly recieving it ?</p>
|
<p> Are you OK with how badly you just communicated ? Are you fine with shouting your message out there without firmly grabbing anyone's attention?</p>
|
||||||
</div>
|
</div>
|
||||||
</div><!-- /row -->
|
</div><!-- /row -->
|
||||||
</div> <!-- /container -->
|
</div> <!-- /container -->
|
||||||
@ -94,6 +94,7 @@
|
|||||||
<li><p><b>What ?</b> If they care, What are the tools at their disposal to solve that problem ?</p></li>
|
<li><p><b>What ?</b> If they care, What are the tools at their disposal to solve that problem ?</p></li>
|
||||||
<li><p><b>How ?</b> How, step by step, can they use those tools to solve the problem ?</p></li>
|
<li><p><b>How ?</b> How, step by step, can they use those tools to solve the problem ?</p></li>
|
||||||
</ol>
|
</ol>
|
||||||
|
<p><b>Don't mix up the order.</b> First the Why, then the What, then the How.</p>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
</div><!-- /row -->
|
</div><!-- /row -->
|
||||||
@ -108,7 +109,7 @@
|
|||||||
<div class="col-lg-8 col-lg-offset-2">
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
<h2><b>How ?</b></h2> </br> </br>
|
<h2><b>How ?</b></h2> </br> </br>
|
||||||
<p>Now that you are aware that there is a way to write good quality tutorials, let's look at how to write them, step by step.</p>
|
<p>Now that you are aware that there is a way to write good quality tutorials, let's look at how to write them, step by step.</p>
|
||||||
<p>First, ALWAYS start with the <b>WHY</b>, why the hell should all those mortals even care about your message. <b>To do that, you need to tell them a story that highlights the problem</b>. Most people are not even aware that there is a problem in the first place, so you must tell them.</p>
|
<p>First, ALWAYS start with the <b>WHY</b>, why the hell should all those mortals even care about your message. <b>To do that, you need to tell them a story that highlights a problem</b>. Most people may not even aware that there is a problem in the first place, so you must tell them, to make them aware of it.</p>
|
||||||
|
|
||||||
<p> So you first contextualize your story, then you explain the situation, and then you ask them if they are ok with it.</p>
|
<p> So you first contextualize your story, then you explain the situation, and then you ask them if they are ok with it.</p>
|
||||||
<pre><code class="nim">
|
<pre><code class="nim">
|
||||||
|
Loading…
Reference in New Issue
Block a user